Nissan Canada Finance, which provides financing for Nissan and Infiniti vehicle buyers and leasers, is warning 1.13 million current and former customers that their personal information may have been stolen.
New York-Presbyterian has more than 72,000 medical devices from over 1,400 manufacturers, says CISO Jennings Aske. Given that scale, how can a security leader help ensure device cybersecurity? Aske shares his view of what's needed from manufacturers and the government.
Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.
Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
The U.S. Food and Drug Administration issued cybersecurity expectations for manufacturers of medical devices. But ow are those expectations being met, and what is the FDA's ongoing role in improving device security? The FDA's Suzanne Schwartz offers an update.
Since the massive data breach of credit bureau Equifax, the U.S. Congress has become more interested in the causes of data breaches. Australian security expert Troy Hunt, who recently traveled to Washington to share his insights with a House committee, discusses what he told lawmakers in this in-depth interview.
Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
The international payments system is largely based on the three-decades old SWIFT messaging system. But cyberattackers have exploited weak controls employed by banks to make fraudulent transfers. Nick Armstrong of Identitii discusses a path forward for securing payments made with legacy systems.
Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on legislation designed to improve the security of U.S. elections.
To better address security issues, companies in the manufacturing industry need to ensure proper communications between their operational technology and information technology specialists, says RaviKiran Avvaru, head of IT at Toyota Kirloskar.
Two London-based Romanians recently arrested in Bucharest as part of a roundup of alleged ransomware attackers have been accused of hacking into Washington surveillance cameras and using them as a launchpad for Cerber and Dharma ransomware attacks.
Compared to the mega-breaches that hit the healthcare sector in 2015 and 2016, the top 10 breaches reported for 2017 were far smaller. Security experts analyze whether that's really a sign of progress.